2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) 2011
DOI: 10.1109/wimob.2011.6085375
|View full text |Cite
|
Sign up to set email alerts
|

Erasure coding with replication to defend against malicious attacks in DTN

Abstract: Privacy and security in delay-tolerant networks (DTNs) have been an active research topic in the recent years, especially, as people can be involved in these networks and use their mobile devices to forward each other's messages. Such communications require forwarding algorithms that often include replication or context awareness. In this paper, we study the security impact on specific forwarding protocols in both simulated City Scenario and using real connectivity data traces. We propose a hybrid technique co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…In DTNs, nodes are vulnerable to various attacks such as black hole [55], insider [56], gray hole [57], wormhole [58]- [60], Denial Of Service (DOS), Distributed Denial of Service (DDOS)/flood [61], faulty node [62], [63] and packet drop [64]. Apart from the above-mentioned attacks, misbehaving nodes is one of the key challenging issues of DTNs.…”
Section: Introductionmentioning
confidence: 99%
“…In DTNs, nodes are vulnerable to various attacks such as black hole [55], insider [56], gray hole [57], wormhole [58]- [60], Denial Of Service (DOS), Distributed Denial of Service (DDOS)/flood [61], faulty node [62], [63] and packet drop [64]. Apart from the above-mentioned attacks, misbehaving nodes is one of the key challenging issues of DTNs.…”
Section: Introductionmentioning
confidence: 99%
“…In our previous work in [19] we have used Erasure Coding (EC) and distributed replication at Intermediaries nodes to defend against malicious dropping attacks in DTNs. Static nodes on the forwarding path between the source and destination were assumed to continuously perform erasure coding to minimize the impact of malicious dropping.…”
Section: Flexible Network Coding For Congestion Aware Data Transmentioning
confidence: 99%